About your Search

20130416
20130424
Search Results 0 to 3 of about 4
, tools and technologies. war the, what are the best technologies we can use for both prevention and te -- detection. secondly, on the issue of information sharing, what are the things we need to do to improve the information sharing flow between government and industry, and that is a focus of our discussions with the various agencies who we deal with. and thirdly, very important for us is response and recovery. again, we build a lot of redundancy and resiliency in the system. we do recovery pretty well like hurricane sandy. we brought 67,000 crews from all over the country to help get the system back on. but cyber is somewhat different. and so we're working very, very diligently on a response and recovery plan. so if there is an outage, if there is caused by cybersecurity, we can come back quickly. >> but, again, the question really is th oama administration and mnyate democrats have maintained the implementation of standards even if they are baselines for critical infrastructure sectors would compel better behavior. have you seen that in the electric industry that that the establishme
is the next question. >> caller: the standards and technology. the agency tasked with buildis fail -- >> host three mike. do you have ollowup question? we undd whe you are going. >> caller: sample -- >> host: we'll see what the senator has to say about that. 9/11 conspiracy theories and different ways of looking at 9/11. what are your thoughts? >> guest: you know, the report that i go by is 9/11 commission frankly, many of the recommendations and assessments have become very relevant this week as we have dealt with a shocking tragedy in tbons. and, you know, actually given me this week an opportunity to reflect on how far we have come, for example, with homeland security in the ten years since that agency was created. as you noted, i'm on the home land security and government affairs committee, and, you know, they are hard at work. the joint terrorism task force through the fbi and homeland security and local officials in boston and trying to bring answers and bring ultimately the perpetrators to bear the full weight of justice in the united states. but, you know, back to the caller's questio
to science, technology, engineering and math? and i'm happy to have so many key members of my science team who are here today including my chief science adviser, john holder, who's here. there's john. nih director francis collins. there's francis right there, the tall guy. we've got acting director of the national science foundation, cora merit, there's cora, and we've got real life astronaut and nasa administrator charles bolton. where's charlie? there he is right there. we need to make in this a priority, train an army of new teachers in these subject areas and to make sure that all of us as a country are lifting up these subjects for the respect that that they deserve. you know, and one of the things i'm concerned about is that as a culture, you know, we're great consumers of technology, but we're not always properly respecting the people who are in the labs and, you know, behind the scenes creating the stuff that we now take for granted. and we've got to give the millions of americans who work in science and technology not only the kind of respect they deserve, but also new ways to eng
records are prime targets for attackers to steal. according to the information technology industry council, 18 adults become victims to cybercrime, including identity campaigns ishing every second. this adds up to 1 1/2 million cybercrime victims each day. cyberattacks present a very real and dangerous threat to the united states, however the government currently
Search Results 0 to 3 of about 4

Terms of Use (10 Mar 2001)